Embedded Software // Articles
Refine Embedded Software articles:
embedded linux embedded software software analysis rtos real-time operating system embedded real-time operating system arinc 653 embedded os embedded real time embedded realtime lynxos osek psos qnx os real time real time embedded software real time embedded system real time embedded systems real time kernel real time operating system real time operating systems real time os real time system real time systems real-time operating systems realtime realtime operating system realtime os rtxc threadx vrtx vx works vxworks vxworks os interface designer embedded gui nucleus ment1 meng static analysis embedded system programming java tools embedded software system embedded software systems embedded software company embedded software companies embedded software development embedded software architecture embedded software design embedded programming embedded software engineering embedded java java software software debug switch management execution sequencing runtime memory cyassl windows ce c windowsce ce download windows embedded ce for windowsce microsoft windows ce.net microsoft windows ce.net 4.2 microsoft.windowsce opennetcf.windowsce or windowsce pocket pc database pocket pc development programming windows embedded ce 6.0 public.windowsce virtual pc/windows ce win ce wince window ce 5 window ce 6 window ce download window ce.net windows ce.forms windows ce.net windows ce.net 5 windows embedded windows embedded ce windows embedded ce 6 windows embedded ce 6.0 windows mobile windows mobile ce windows mobile software windows pocket windows xp ce windows xpe windowsce 4.2 windowsce device windowsce software windowsce.forms windowsce.net embedded: dev tools and os -
safety certification and security→ September 2016
Test and analysis tools help verify and enforce security in military systems
Static analysis→ April 2016White Paper: Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards
Automotive→ October 2015White Paper: MISRA: An Overview
read more]
You don't have to take much interest in the world of embedded software before you learn about coding standards and then become aware of MISRA C. A little further in and you become aware that there is more to MISRA than just MISRA C. This paper provides a quick overview of MISRA, coding standards and... [Static code analysis→ April 2016White Paper: Addressing Security Vulnerabilities at the Source: A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software
read more]
While there are a variety of security tools and methods that can be applied at different stages of the software development lifecycle, proponents of all methodologies agree on one point: Developers need to thoroughly examine source code to identify security-relevant defects. To this end, static ana... [Static analysis→ April 2016White Paper: How IoT is Making Security Imperative for All Embedded Software
read more]
While there are a variety of security tools and methods that can be applied at different stages of the software development lifecycle, proponents of all methodologies agree on one point: Developers need to thoroughly examine source code to identify security-relevant defects. To this end, static ana... [Static analysis→ October 2016White Paper: Finding Concurrency Errors with GrammaTech Static Analysis
read more]
Multithreading adds entirely new classes of potential bugs to those that must be considered by developers. At the same time, the nondeterminism and sheer number of possibilities introduced by thread interleaving make it significantly more difficult to find bugs in multithreaded systems by testing an... [embedded hardware→ October 2016RF transceivers provide breakthrough SWaP solutions for defense and aerospace applications
read more]
Integrating more software control and cognitive abilities to military radios demands a more frequency- and bandwidth-flexible radio frequency (RF) design. To achieve this goal, static filters need to be removed and replaced with tunable filters. Similarly, the concept of a common platform would allo... [Embedded software→ March 2017White Paper: Automate Code Review with Formal Semantic Analysis
→ 14th EditionMaking the Fog Smarter
read more]
According to the 2016 ABI Research report, "Edge Analytics in IoT," organizations currently use only 10 percent of the data generated by the Internet of Things (IoT), and an even smaller amount undergoes deeper analysis. Nevertheless, many organizations continue to target the cloud as the assumed, e... [Signal processing→ September 2017Analysis of modern radar and electronic warfare signals using advanced RF measurement techniques
read more]
Modern radar and electronic warfare (EW) systems rely on sophisticated signal processing and complex radio-frequency (RF) modulation on pulse. Without proper signal design verification, these techniques may not be effective during critical engagements, which could be catastrophic for the operator. D... [Embedded software→ April 2016White Paper: Developing Secure Embedded Software
read more]
Any organization that ignores the warning signs of increased cyber attacks is likely to suffer economic consequences when it becomes the next target. This paper explains why some commonly used approaches to incorporating security into software development lifecycles typically fail and outlines a dev... [Signal processing→ September 2016Oscilloscope segmented memory and pulse analysis software provide FM chirp pulsed RF evaluation
read more]
A class of pulsed radio frequency (RF), microwave, and mmWave applications present a measurement challenge to radar and electronic warfare (EW) designers due to the need for wide analysis bandwidth, as well as a desire to evaluate a significant time period of system activity. Segmented memory in wid... [Source Code Analysis→ October 2016White Paper: Eliminating Vulnerabilities in Third-Party Code with Binary Analysis
read more]
Over the last few years, third-party code has moved from a minor factor in software development to a dominant force in the industry. It is now used throughout software development in all applications, from highly sensitive government and military applications to security-intensive consumer commerce ... [embedded hardware→ July/August 2016Turbocharge HPEC system design with HPC development tools
read more]
As parallel programming grows in importance and popularity, the critical challenge has become how to intelligently manage, develop, and debug the increasingly complex code. Traditional tools such as trace analysis, serial debuggers, and the venerable "printf"statement just aren't up to the task. Alt... [→ September 2018Electronics funding for radar, electronic warfare, C4ISR continues to rise
Signal processing→ September 2017C4ISR, radar, electronic warfare, unmanned markets continue growth
embedded hardware→ February/March 2016Motor control in "more electric" aircraft
market analysis→ September 2015C4ISR funding a bright spot in military electronics market
embedded software→ October 2015Encrypting storage in small form factors
supply chain→ January 2016White Paper: Next Generation Bill of Materials Management: Beyond BOM 101
read more]
In the world of product design and manufacturing, the bill of materials (BOM) is a critical product information record for both the engineering and manufacturing teams. Managing BOMs with the wrong tools can cause product errors, delays and compliance failures. In this white paper, we outline the pr... [Signal processing→ April/May 2018Pushing airborne ISR data recorders to new performance heights
read more]
Capturing wire rate data from today's compute-intensive intelligence, surveillance, and reconnaissance (ISR) sensor platforms brings new meaning to the old metaphor "drinking from a fire hose." Airborne ISR systems may have hundreds of cameras and other sensors that generate data that needs to be ca... [GPUs→ October 2015White Paper: Perceptual Computing: Inflection Point for Embedded Applications
read more]
To perceive is to assign meaning to what we see, hear, touch, taste and smell. Similarly, perceptual computing offers users a more natural way to interact with machines. Today's platforms have the ability to go well beyond simple facial recognition, which is becoming quite common today as a way to r... [embedded hardware→ November 2015Battling the heat in military CPUs
Oscilloscopes→ April 2016White Paper: High-Resolution Measurements with R&S Oscilloscopes
read more]
With the RTO-K17/RTE-K17 High Definition Option the user will see more signal details with up to 16 bit vertical resolution. In combination with the superior analog front end of the RTO and RTE, the user has a versatile instrument in his hands to analyze a wide range of applications. From Switch Mo... [Automotive→ March 2017White Paper: Key Considerations for Powertrain HIL Test
Automotive systems→ June 2016White Paper: Key Considerations for Powertrain HIL Test
Storage→ December 2015White Paper: Automation Industry: Industry 4.0 Challenges and Solutions for Storage Devices
read more]
Industry 4.0 (the 4th revolution), representing the integration of Cyber and Physical systems concept, has been the ultimate hot topic since its first introduction in 2011. The idea of a "Smart Factory" emerges and its sophisticated control systems/platforms enable process optimization, data capture... [embedded hardware→ January 2016Next-gen military radar system design innovations
xTCA→ Spring 2017SHB Express still going strong - PICMG 1.3 application examples
Embedded software→ October 2015Military software-defined radio benefits from commercial and consumer trends
embedded hardware→ July/August 2015Counterfeit IC threat evolves with spread of clone parts
read more]
The better government and industry get at detecting counterfeit parts, the better counterfeiters get at fooling detection techniques, especially today with remanufactured or cloned parts adding to the threat. They are an imminent threat as they can permeate military systems, from fighter jets to nuc... [LTE→ April 2016White Paper: LTE and Bluetooth in-device coexistence with WLAN
read more]
Modern mobile phones can support cellular and noncellular wireless communications standards at the same time. This means, however, that the subsystems must operate in very close proximity to each other within a single device (in-device coexistence). The resulting high level of reciprocal leakage can... [embedded hardware→ January 2016Designing COTS for data security